Category: GSSP-JAVA

Which of the following methods is used to request that any pending finalizers be run for objects eligible forgarbage collection? A. freeMemory() B. gc() C. runFinalization() D. runFinalizers() Explanation: Show Answer

You work as a Software Developer for UcTech Inc. You want to declare a security constraint in the deploymentdescriptor using the <transport-guarantee> element. Which of the following can be the possible values for theelement?Each correct answer represents a complete solution. Choose all that apply. A. CONFIDENTIAL B. ALL C. NONE D. INTEGRAL Explanation: Show Answer

You work as a Software Developer for UcTech Inc. You want to write a filter that will implement the Filterinterface. Which of the following methods will you use to accomplish the task?Each correct answer represents a complete solution. Choose all that apply. A. doPostFilter() B. doGetFilter() C. doFilter() D. init() E. service() Explanation: Show Answer

Which of the following is used to restore the objects that have been previously serialized by a stream? A. FileInputStream B. ObjectOutputStream C. ObjectInputStream D. FileOutputStream Explanation: Show Answer

You work as a Software Developer for UcTech Inc. You build an online book shop, so that users can purchasebooks using their credit cards. You want to ensure that only the administrator can access the credit cardinformation sent by users. Which security mechanism will you use to accomplish the task? A. Confidentiality B. Authorization C. […]

You work as a Programmer for InfoTech Inc and develop the following two <security-constraint>declarations.<security-constraint><web-resource-collection><web-resource-name>Manager</web-resource-name><url-pattern>/acme/Manager/*</url-pattern><http-method>GET</http-method><http-method>POST</http-method></web-resource-collection><auth-constraint/></security-constraint><security-constraint><web-resource-collection><web-resource-name>Manager</web-resource-name><url-pattern>/acme/Manager/*</url-pattern><http-method>GET</http-method><http-method>POST</http-method></web-resource-collection><auth-constraint><role-name>Manager</role-name></auth-constraint></security-constraint> Which of the following statements is true about the <auth-constraint> in the code given above? A. Nobody is allowed to access the specified resources. B. Only Manager is allowed to access the specified resources. C. The first <security-constraint> element declaration is […]

Mark works as a Programmer for InfoTech Inc. He develops a Java application that uses the encryption andcompression techniques. Which of the following interfaces will he use to control the serialization anddeserialization processes? A. Flushable B. Closeable C. Serializable D. Externalizable Explanation: Show Answer